Dormakaba provides the software FWServiceTool to update the firmware version of the Access Managers via the network. The firmware in some instances is provided in an encrypted ZIP file. Within this tool, the password used to decrypt the ZIP and extract the firmware is set statically and can be extracted. This password was valid for multiple observed firmware versions.
Advisories

No advisories yet.

Fixes

Solution

This will not be fixed. The K5 device is discontinued and needs to be replaced by a K7 device.


Workaround

No workaround given by the vendor.

History

Tue, 27 Jan 2026 04:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 19:15:00 +0900

Type Values Removed Values Added
Description Dormakaba provides the software FWServiceTool to update the firmware version of the Access Managers via the network. The firmware in some instances is provided in an encrypted ZIP file. Within this tool, the password used to decrypt the ZIP and extract the firmware is set statically and can be extracted. This password was valid for multiple observed firmware versions.
Title Static Firmware Encryption Password in dormakaba access manager
Weaknesses CWE-798
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-01-26T15:38:11.839Z

Reserved: 2025-09-09T07:53:12.880Z

Link: CVE-2025-59107

cve-icon Vulnrichment

Updated: 2026-01-26T15:29:22.725Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-26T10:16:08.633

Modified: 2026-01-26T15:03:33.357

Link: CVE-2025-59107

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses